Information and Network Security

Information and Network Security

University

15 Qs

quiz-placeholder

Similar activities

Practice quiz on Hematology2

Practice quiz on Hematology2

University

15 Qs

DUBAI 2019

DUBAI 2019

University

10 Qs

IMPERFECTIONS IN SOLID AND PHASE DIAGRAM

IMPERFECTIONS IN SOLID AND PHASE DIAGRAM

University

10 Qs

GTN215 Topic 10. Mineral

GTN215 Topic 10. Mineral

University

10 Qs

Environmental Studies - Test 2

Environmental Studies - Test 2

University

15 Qs

Cerebrovascular Disease

Cerebrovascular Disease

University

10 Qs

Narcotic Analgesics + NSAIDs

Narcotic Analgesics + NSAIDs

University

16 Qs

Introduction to Halal Slaughtering

Introduction to Halal Slaughtering

University

10 Qs

Information and Network Security

Information and Network Security

Assessment

Quiz

Science

University

Practice Problem

Hard

Created by

Pratibha Jadhav

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is information Security ?

About securing information from unauthorized access.

vulnerability protection that comes in the form of a physical device rather than software

refers to the range of tools, controls, and measures designed to establish and preserve database confidentiality

refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DOS stand for _____

denial of service

daniel of service

do on schedule

dont open the slot

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is mean by one party cannot deny receiving a message or a transaction nor can the other party deny sending a message or a transaction?

Non-repudiation
Confidentiality
Integrity
Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the formula for Decryption in Caesar Cipher?

p=(c-k) mod 26
c=p+k
c=(p+k) mod 26
p=c-k

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a(n) …...........cipher, the same key is used by both sender and receiver.

A Symmetric-Key
An Asymmetric-key
Both symmetric and asymmetric
none of the mentioned

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

…........... means information is not disclosed to unauthorized individuals, entities and process. 

Confidentiality
Non -Repudiation
Availabilty
Integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Attack which involves modification of Data is known as _____.

active attack
passive attack
security attack
threat attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?